CVE-2025-22946: n/a
CVE-2025-22946 is a critical stack overflow vulnerability in the Tenda AC9 v1. 0 router firmware version 15. 03. 05. 19, specifically in the /goform/SetOnlineDevName endpoint. This flaw allows unauthenticated remote attackers to execute arbitrary code on the device without user interaction. The vulnerability stems from improper input validation leading to a classic buffer overflow (CWE-120). Exploitation could compromise confidentiality, integrity, and availability of the affected device and potentially the entire network it serves. No patches are currently available, and no exploits have been observed in the wild yet. Organizations using this router model should prioritize mitigation to prevent potential attacks.
AI Analysis
Technical Summary
CVE-2025-22946 identifies a critical security vulnerability in the firmware of the Tenda AC9 v1.0 wireless router, specifically version 15.03.05.19. The vulnerability is a stack-based buffer overflow located in the /goform/SetOnlineDevName HTTP endpoint, which is part of the router's web management interface. This flaw arises due to insufficient bounds checking on input data submitted to this endpoint, allowing an attacker to overwrite the stack memory. Because the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, an attacker can send specially crafted HTTP requests to trigger the overflow. Successful exploitation can lead to arbitrary code execution with the privileges of the router’s firmware process, potentially allowing full control over the device. This includes the ability to intercept, modify, or redirect network traffic, install persistent malware, or use the device as a pivot point for further attacks within the network. The vulnerability is classified under CWE-120 (Classic Buffer Overflow) and has a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability. As of the published date, no official patches or firmware updates have been released by Tenda, and no known exploits have been detected in the wild. However, the high severity and ease of exploitation make this a significant threat to users of the affected router model.
Potential Impact
The impact of CVE-2025-22946 is severe for organizations and individuals using the Tenda AC9 v1.0 router with the vulnerable firmware. Successful exploitation can lead to complete compromise of the router, allowing attackers to execute arbitrary code remotely without authentication. This can result in interception of sensitive data, manipulation of network traffic, disruption of internet connectivity, and establishment of persistent backdoors. For enterprises, this could mean exposure of internal network resources, data breaches, and lateral movement by attackers. For home users, it could lead to privacy violations and use of the device in botnets or other malicious activities. Given the router’s role as a network gateway, the vulnerability undermines the security of all connected devices. The lack of patches increases the window of exposure, and the critical CVSS score highlights the urgency of addressing this threat. Although no exploits are currently known in the wild, the vulnerability’s characteristics make it a likely target for attackers once exploit code becomes available.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC9 v1.0 routers from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual activity or unexpected connections originating from the router. 3. Implement network segmentation to limit the impact of a compromised router on critical systems. 4. Use firewall rules to restrict access to the router’s management interface, ideally limiting it to trusted IP addresses or disabling remote management entirely. 5. Regularly check Tenda’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with a strong security track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploit attempts targeting this specific endpoint. 8. Educate network administrators about this vulnerability to ensure rapid response and mitigation. 9. Maintain backups of router configurations to facilitate recovery after remediation. These steps go beyond generic advice by focusing on network-level controls, monitoring, and proactive isolation until a patch is available.
Affected Countries
China, India, United States, Brazil, Russia, Indonesia, Vietnam, Thailand, Mexico, Nigeria
CVE-2025-22946: n/a
Description
CVE-2025-22946 is a critical stack overflow vulnerability in the Tenda AC9 v1. 0 router firmware version 15. 03. 05. 19, specifically in the /goform/SetOnlineDevName endpoint. This flaw allows unauthenticated remote attackers to execute arbitrary code on the device without user interaction. The vulnerability stems from improper input validation leading to a classic buffer overflow (CWE-120). Exploitation could compromise confidentiality, integrity, and availability of the affected device and potentially the entire network it serves. No patches are currently available, and no exploits have been observed in the wild yet. Organizations using this router model should prioritize mitigation to prevent potential attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-22946 identifies a critical security vulnerability in the firmware of the Tenda AC9 v1.0 wireless router, specifically version 15.03.05.19. The vulnerability is a stack-based buffer overflow located in the /goform/SetOnlineDevName HTTP endpoint, which is part of the router's web management interface. This flaw arises due to insufficient bounds checking on input data submitted to this endpoint, allowing an attacker to overwrite the stack memory. Because the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, an attacker can send specially crafted HTTP requests to trigger the overflow. Successful exploitation can lead to arbitrary code execution with the privileges of the router’s firmware process, potentially allowing full control over the device. This includes the ability to intercept, modify, or redirect network traffic, install persistent malware, or use the device as a pivot point for further attacks within the network. The vulnerability is classified under CWE-120 (Classic Buffer Overflow) and has a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability. As of the published date, no official patches or firmware updates have been released by Tenda, and no known exploits have been detected in the wild. However, the high severity and ease of exploitation make this a significant threat to users of the affected router model.
Potential Impact
The impact of CVE-2025-22946 is severe for organizations and individuals using the Tenda AC9 v1.0 router with the vulnerable firmware. Successful exploitation can lead to complete compromise of the router, allowing attackers to execute arbitrary code remotely without authentication. This can result in interception of sensitive data, manipulation of network traffic, disruption of internet connectivity, and establishment of persistent backdoors. For enterprises, this could mean exposure of internal network resources, data breaches, and lateral movement by attackers. For home users, it could lead to privacy violations and use of the device in botnets or other malicious activities. Given the router’s role as a network gateway, the vulnerability undermines the security of all connected devices. The lack of patches increases the window of exposure, and the critical CVSS score highlights the urgency of addressing this threat. Although no exploits are currently known in the wild, the vulnerability’s characteristics make it a likely target for attackers once exploit code becomes available.
Mitigation Recommendations
1. Immediately isolate affected Tenda AC9 v1.0 routers from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual activity or unexpected connections originating from the router. 3. Implement network segmentation to limit the impact of a compromised router on critical systems. 4. Use firewall rules to restrict access to the router’s management interface, ideally limiting it to trusted IP addresses or disabling remote management entirely. 5. Regularly check Tenda’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with a strong security track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting exploit attempts targeting this specific endpoint. 8. Educate network administrators about this vulnerability to ensure rapid response and mitigation. 9. Maintain backups of router configurations to facilitate recovery after remediation. These steps go beyond generic advice by focusing on network-level controls, monitoring, and proactive isolation until a patch is available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1bb7ef31ef0b54e308
Added to database: 2/25/2026, 9:35:23 PM
Last enriched: 2/25/2026, 10:13:14 PM
Last updated: 2/26/2026, 6:12:55 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.